TY - GEN
T1 - Rateless Code-Aided Transmission Scheme to Achieve Secrecy in a Delay-Constraint Environment
AU - Jain, Sonam
AU - Bose, Ranjan
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/12
Y1 - 2019/12
N2 - This paper analyses a secure transmission scheme using rateless codes (RC). As per the characteristic of the RC, receiver has to accumulate sufficient number of packets to reconstruct the entire source file. By utilizing the aforementioned characteristic, secure delivery can be achieved if the legitimate user accumulates required number of packets before the eavesdropper does. Thus, to expedite the decoding rate of the packets at the intended user, a two slot cooperative relaying is used. Besides, in this scheme, destination assists the source node and the source node assists the relay node in the first and the second slot respectively, to cooperatively send artificial noise without affecting the legitimate receiver. Quality of violation probability (QVP) which includes delay, reliability and secrecy is used as the performance metric, and its closed-form is derived. Both feedback-aided transmission (FT) and un-aided transmission (UT) are studied. Result shows that for FT, an increase in the total power reduces QVP, and by increasing the number of source packets intercept probability decays for both UT and FT.
AB - This paper analyses a secure transmission scheme using rateless codes (RC). As per the characteristic of the RC, receiver has to accumulate sufficient number of packets to reconstruct the entire source file. By utilizing the aforementioned characteristic, secure delivery can be achieved if the legitimate user accumulates required number of packets before the eavesdropper does. Thus, to expedite the decoding rate of the packets at the intended user, a two slot cooperative relaying is used. Besides, in this scheme, destination assists the source node and the source node assists the relay node in the first and the second slot respectively, to cooperatively send artificial noise without affecting the legitimate receiver. Quality of violation probability (QVP) which includes delay, reliability and secrecy is used as the performance metric, and its closed-form is derived. Both feedback-aided transmission (FT) and un-aided transmission (UT) are studied. Result shows that for FT, an increase in the total power reduces QVP, and by increasing the number of source packets intercept probability decays for both UT and FT.
KW - artificial noise
KW - Decode
KW - delay constraint
KW - forward relay
KW - Rateless codes
UR - http://www.scopus.com/inward/record.url?scp=85087281765&partnerID=8YFLogxK
U2 - 10.1109/ANTS47819.2019.9118153
DO - 10.1109/ANTS47819.2019.9118153
M3 - Conference contribution
AN - SCOPUS:85087281765
T3 - International Symposium on Advanced Networks and Telecommunication Systems, ANTS
BT - ANTS 2019 - 13th IEEE International Conference on Advanced Networks and Telecommunications Systems
PB - IEEE Computer Society
T2 - 13th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2019
Y2 - 16 December 2019 through 19 December 2019
ER -